8 steps to better security : a simple cyber resilience guide for business /
"Harden your business against internal and external cybersecurity threats with a single accessible resource. In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical roadmap to cyber resilience...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Hoboken :
John Wiley & Sons, Inc.,
[2021]
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Foreword
- Introduction
- Chapter 1 Step 1: Foster a Strong Security Culture
- Kevin Mitnick, Human Hacker Extraordinaire
- The Importance of a Strong Security Culture
- Hackers Are the Bad Guys, Right?
- What Is Security Culture?
- How to Foster a Strong Security Culture
- Security Leaders on Security Culture
- What Makes a Good CISO?
- The Biggest Mistakes Businesses Make When It Comes to Cybersecurity
- The Psychological Phases of a Cybersecurity Professional
- Chapter 2 Step 2: Build a Security Team
- Why Step 2 Is Controversial
- How to Hire the Right Security Team. . .the Right Way
- Security Team Tips from Security Leaders
- The "Culture Fit"-Yuck!
- Cybersecurity Budgets
- Design Your Perfect Security Team
- Chapter 3 Step 3: Regulatory Compliance
- What Are Data Breaches, and Why Are They Bad?
- The Scary Truth Found in Data Breach Research
- An Introduction to Common Data Privacy Regulations
- The General Data Protection Regulation
- The California Consumer Privacy Act
- The Health Insurance Portability and Accountability Act
- The Gramm-Leach-Bliley Act
- Payment Card Industry Data Security Standard
- Governance, Risk Management, and Compliance
- More About Risk Management
- Threat Modeling
- Chapter 4 Step 4: Frequent Security Testing
- What Is Security Testing?
- Security Testing Types
- Security Audits
- Vulnerability Assessments Versus Penetration Testing
- Red Team Testing
- Bug Bounty Programs
- What's Security Maturity?
- The Basics of Security Audits and Vulnerability Assessments
- Log Early, Log Often
- Prepare for Vulnerability Assessments and Security Audits
- A Concise Guide to Penetration Testing
- Penetration Testing Based on Network Knowledge
- Penetration Testing Based on Network Aspects
- Security Leaders on Security Maturity
- Security Testing Is Crucial
- Chapter 5 Step 5: Security Framework Application
- What Is Incident Response?
- Preparation
- Identification or Analysis
- Containment, Mitigation, or Eradication
- Recovery
- Post-incident
- Your Computer Security Incident Response Team
- Cybersecurity Frameworks
- NIST Cybersecurity Framework
- ISO 27000 Cybersecurity Frameworks
- CIS Controls
- COBIT Cybersecurity Framework
- Security Frameworks and Cloud Security
- Chapter 6 Step 6: Control Your Data Assets